Warning: Permanently added '10.128.10.31' (ECDSA) to the list of known hosts. 2019/10/22 01:17:38 fuzzer started 2019/10/22 01:17:39 dialing manager at 10.128.0.105:37053 2019/10/22 01:17:39 syscalls: 2524 2019/10/22 01:17:39 code coverage: enabled 2019/10/22 01:17:39 comparison tracing: enabled 2019/10/22 01:17:39 extra coverage: extra coverage is not supported by the kernel 2019/10/22 01:17:39 setuid sandbox: enabled 2019/10/22 01:17:39 namespace sandbox: enabled 2019/10/22 01:17:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 01:17:39 fault injection: enabled 2019/10/22 01:17:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 01:17:39 net packet injection: enabled 2019/10/22 01:17:39 net device setup: enabled 2019/10/22 01:17:39 concurrency sanitizer: enabled 01:17:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_msfilter(r0, 0x0, 0x31, &(0x7f00000000c0)={@empty, @remote}, 0x10) 01:17:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x72109c5fef5d34d3) r3 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={0xfffffffffffffffe}, 0x0, 0x8) fcntl$setownex(r2, 0xf, &(0x7f0000fa4000)={0x0, r3}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) fcntl$notify(r2, 0xa, 0x34) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r4) syzkaller login: [ 53.964587][ T7257] IPVS: ftp: loaded support on port[0] = 21 [ 54.108042][ T7257] chnl_net:caif_netlink_parms(): no params data found [ 54.155676][ T7260] IPVS: ftp: loaded support on port[0] = 21 [ 54.183280][ T7257] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.190546][ T7257] bridge0: port 1(bridge_slave_0) entered disabled state 01:17:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000016c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x18, r1, 0xa15, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) [ 54.199981][ T7257] device bridge_slave_0 entered promiscuous mode [ 54.219727][ T7257] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.228147][ T7257] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.236630][ T7257] device bridge_slave_1 entered promiscuous mode [ 54.287437][ T7257] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.311036][ T7257] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.355640][ T7257] team0: Port device team_slave_0 added [ 54.376448][ T7257] team0: Port device team_slave_1 added [ 54.514309][ T7257] device hsr_slave_0 entered promiscuous mode 01:17:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) set_mempolicy(0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) [ 54.581861][ T7257] device hsr_slave_1 entered promiscuous mode [ 54.646677][ T7263] IPVS: ftp: loaded support on port[0] = 21 [ 54.653939][ T7260] chnl_net:caif_netlink_parms(): no params data found [ 54.743477][ T7260] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.750640][ T7260] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.772252][ T7260] device bridge_slave_0 entered promiscuous mode [ 54.780455][ T7257] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.787649][ T7257] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.795040][ T7257] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.802151][ T7257] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.826449][ T7260] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.833605][ T7260] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.841843][ T7260] device bridge_slave_1 entered promiscuous mode [ 54.867602][ T7265] IPVS: ftp: loaded support on port[0] = 21 [ 54.888583][ T7260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.900221][ T7260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.926633][ T7260] team0: Port device team_slave_0 added [ 54.945986][ T7260] team0: Port device team_slave_1 added 01:17:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 55.034352][ T7260] device hsr_slave_0 entered promiscuous mode [ 55.072017][ T7260] device hsr_slave_1 entered promiscuous mode [ 55.113583][ T7260] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.170131][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.192246][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.222199][ T7257] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.338539][ T7257] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.349194][ T7263] chnl_net:caif_netlink_parms(): no params data found [ 55.356851][ T7270] IPVS: ftp: loaded support on port[0] = 21 [ 55.362440][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.370708][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:17:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000200)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) r1 = getpid() r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x2) write$P9_RGETLOCK(r2, &(0x7f0000000400)={0x30, 0x37, 0x2, {0x2, 0x9, 0x0, r1, 0x12, '/dev/snd/midiC#D#\x00'}}, 0x30) sched_setscheduler(r1, 0x0, &(0x7f00000000c0)) write$cgroup_int(r0, &(0x7f0000000080), 0x87f4a4) socketpair(0x10, 0xa, 0x1f, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000010b7705f000000000000000000000000beb10f040000006abb55888abac3c0bcb3ff0d00f084fc5fe31b62e6fdc6ecc0c69dbb93225d54810b593c36436ccd2ca8cd14d81fa726d01468deb57f404d585de1bd91654b16bb247e8943240e4c54fee1da0597b010196ecaed8f68dc47573b141931830702ef32a8637e34adfad13c6818509a4c9290329538660f41ad3f574a4b7b7c2ba74a5af0debb1ad1d5961c7fbbe48ca4fcc7ead4a5f1bb1bab4afb8257"]) [ 55.419163][ T7260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.437657][ T7271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.449633][ T7271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.458870][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.465973][ T7271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.497793][ T7260] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.508621][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.518574][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.529999][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.537106][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.549741][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.559814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.572105][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.580098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.611325][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.620486][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.631403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.640323][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.649375][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.656498][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.664717][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.673598][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.682878][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.691852][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.700516][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.707716][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.729923][ T7275] IPVS: ftp: loaded support on port[0] = 21 [ 55.732190][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.744343][ T7263] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.753923][ T7263] device bridge_slave_0 entered promiscuous mode [ 55.764742][ T7265] chnl_net:caif_netlink_parms(): no params data found [ 55.783386][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.792583][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.800756][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.810733][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.820404][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.829192][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.838641][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.847565][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.856282][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.864907][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.877234][ T7266] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.887217][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.894505][ T7263] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.902640][ T7263] device bridge_slave_1 entered promiscuous mode [ 55.924225][ T7257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.957619][ T7263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.972135][ T7263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.985483][ T7260] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.995904][ T7260] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.040941][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.051146][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.060122][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.068493][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.077499][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.086262][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.094771][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.153818][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.160884][ T7265] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.169032][ T7265] device bridge_slave_0 entered promiscuous mode [ 56.176948][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.184373][ T7265] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.192454][ T7265] device bridge_slave_1 entered promiscuous mode [ 56.200487][ T7263] team0: Port device team_slave_0 added [ 56.207879][ T7263] team0: Port device team_slave_1 added [ 56.260955][ T7257] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.282509][ T7265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.294043][ T7260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.302944][ T7265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.374490][ T7263] device hsr_slave_0 entered promiscuous mode [ 56.441754][ T7263] device hsr_slave_1 entered promiscuous mode [ 56.481404][ T7263] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.489103][ T7270] chnl_net:caif_netlink_parms(): no params data found [ 56.526865][ T7265] team0: Port device team_slave_0 added [ 56.556882][ T7265] team0: Port device team_slave_1 added [ 56.614491][ T7265] device hsr_slave_0 entered promiscuous mode [ 56.672276][ T7265] device hsr_slave_1 entered promiscuous mode [ 56.711376][ T7265] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.743029][ T7270] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.750180][ T7270] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.758602][ T7270] device bridge_slave_0 entered promiscuous mode [ 56.766393][ T7270] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.773815][ T7270] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.782027][ T7270] device bridge_slave_1 entered promiscuous mode [ 56.849712][ T7270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.910941][ T7275] chnl_net:caif_netlink_parms(): no params data found [ 56.931326][ T7290] ================================================================== [ 56.940867][ T7290] BUG: KCSAN: data-race in ktime_get_real_seconds / timekeeping_advance [ 56.949187][ T7290] [ 56.951518][ T7290] write to 0xffffffff86040b08 of 280 bytes by interrupt on cpu 0: [ 56.959333][ T7290] timekeeping_advance+0x893/0xd80 [ 56.964455][ T7290] update_wall_time+0x19/0x20 [ 56.969140][ T7290] tick_do_update_jiffies64+0x1ae/0x260 [ 56.974696][ T7290] tick_sched_do_timer+0xd4/0xe0 [ 56.979090][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 56.979123][ T26] audit: type=1804 audit(1571707066.108:31): pid=7292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir575483439/syzkaller.8FYUdF/0/file0" dev="sda1" ino=16525 res=1 [ 56.979663][ T7290] tick_sched_timer+0x43/0xe0 [ 57.003905][ T7265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.009923][ T7290] __hrtimer_run_queues+0x288/0x600 [ 57.023962][ T7265] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.026343][ T7290] hrtimer_interrupt+0x22a/0x480 [ 57.026370][ T7290] smp_apic_timer_interrupt+0xdc/0x280 [ 57.043332][ T7290] apic_timer_interrupt+0xf/0x20 [ 57.055125][ T7265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.058008][ T7290] __kcsan_setup_watchpoint+0x15/0x4a0 [ 57.058032][ T7290] __tsan_read1+0x2c/0x30 [ 57.074916][ T7290] strlen+0x31/0x60 [ 57.076654][ T7265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.078730][ T7290] insert_header+0x272/0x820 [ 57.078758][ T7290] __register_sysctl_table+0x538/0x880 [ 57.095502][ T7290] [ 57.097856][ T7290] read to 0xffffffff86040b78 of 8 bytes by task 7290 on cpu 1: [ 57.105422][ T7290] ktime_get_real_seconds+0x20/0x40 [ 57.111153][ T7290] tomoyo_supervisor+0xcde/0xd20 [ 57.116133][ T7290] tomoyo_path_number_perm+0x323/0x3c0 [ 57.121600][ T7290] tomoyo_file_ioctl+0x2c/0x40 [ 57.126370][ T7290] security_file_ioctl+0x6d/0xa0 [ 57.131311][ T7290] ksys_ioctl+0x64/0xe0 [ 57.135459][ T7290] __x64_sys_ioctl+0x4c/0x60 [ 57.138427][ T7270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.140066][ T7290] do_syscall_64+0xcc/0x370 [ 57.140093][ T7290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.155064][ T26] audit: type=1804 audit(1571707066.288:32): pid=7292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir575483439/syzkaller.8FYUdF/0/file0" dev="sda1" ino=16525 res=1 [ 57.159479][ T7290] [ 57.186258][ T7290] Reported by Kernel Concurrency Sanitizer on: [ 57.192404][ T7290] CPU: 1 PID: 7290 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 57.200210][ T7290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.206850][ T7270] team0: Port device team_slave_0 added [ 57.210273][ T7290] ================================================================== [ 57.218533][ T7270] team0: Port device team_slave_1 added [ 57.223870][ T7290] Kernel panic - not syncing: panic_on_warn set ... [ 57.223888][ T7290] CPU: 1 PID: 7290 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 57.223895][ T7290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.223899][ T7290] Call Trace: [ 57.223922][ T7290] dump_stack+0xf5/0x159 [ 57.223939][ T7290] panic+0x210/0x640 [ 57.223956][ T7290] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.223983][ T7290] ? vprintk_func+0x8d/0x140 [ 57.275963][ T7290] kcsan_report.cold+0xc/0x10 [ 57.280630][ T7290] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 57.286192][ T7290] __tsan_read8+0x2c/0x30 [ 57.290552][ T7290] ktime_get_real_seconds+0x20/0x40 [ 57.295779][ T7290] tomoyo_supervisor+0xcde/0xd20 [ 57.300704][ T7290] tomoyo_path_number_perm+0x323/0x3c0 [ 57.306182][ T7290] ? __fget+0xb8/0x1d0 [ 57.310268][ T7290] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.315885][ T7290] tomoyo_file_ioctl+0x2c/0x40 [ 57.320625][ T7290] security_file_ioctl+0x6d/0xa0 [ 57.325543][ T7290] ksys_ioctl+0x64/0xe0 [ 57.329676][ T7290] __x64_sys_ioctl+0x4c/0x60 [ 57.334248][ T7290] do_syscall_64+0xcc/0x370 [ 57.338774][ T7290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.344643][ T7290] RIP: 0033:0x459b47 [ 57.348529][ T7290] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 57.368107][ T7290] RSP: 002b:00007f08b06d7ca8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 57.376504][ T7290] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459b47 [ 57.384465][ T7290] RDX: 0000000000000000 RSI: 0000000000006364 RDI: 00000000000000e8 [ 57.392431][ T7290] RBP: 000000000075bfa8 R08: 00007f08b06d8700 R09: 00007f08b06d8700 [ 57.400380][ T7290] R10: 00007f08b06d89d0 R11: 0000000000000246 R12: 0000000000000000 [ 57.408339][ T7290] R13: 00007ffd476fe60f R14: 00007f08b06d89c0 R15: 000000000075bf2c [ 57.417582][ T7290] Kernel Offset: disabled [ 57.421907][ T7290] Rebooting in 86400 seconds..